Search alternatives:
bear » besar (Expand Search), year (Expand Search), near (Expand Search)
bars » baru (Expand Search), bar (Expand Search), sars (Expand Search)
belt » best (Expand Search), melt (Expand Search), felt (Expand Search)
met » meta (Expand Search)
beer » peer (Expand Search), ber (Expand Search)
bear » besar (Expand Search), year (Expand Search), near (Expand Search)
bars » baru (Expand Search), bar (Expand Search), sars (Expand Search)
belt » best (Expand Search), melt (Expand Search), felt (Expand Search)
met » meta (Expand Search)
beer » peer (Expand Search), ber (Expand Search)
-
8601
A two-step approach for cost-effective design analysis of Net Zero Energy Homes
Published 2021“…Through the innovative two-step cost analysis with the optimization model, the cost-effective scenario is identified for NZEH design, while the identified design scenario also meets net-zero energy requirements. The proposed research framework with the mathematical model is demonstrated using an NZEH in Edmonton, Canada, as an example, and a capital cost savings of 4.2% is achieved by applying the proposed two-step approach in this research. …”
Get full text
Journal Article -
8602
"You have to know how to live with it without getting to the addiction part": British young adult experiences of smartphone over-reliance and disconnectivity
Published 2022“…Over-reliance could hinder meeting basic needs, limit time for valued pastimes and could unsettle feelings of agency. …”
Get full text
Article -
8603
User Profiling Based on Nonlinguistic Audio Data
Published 2021“…According to the experimental evaluation of 100 people in 273 meetings, we achieved 0.759 and 0.652 in F1-score for gender identification and personality recognition, respectively.…”
Get full text
Article -
8604
A comparison of Google translate and Youdao translation : a case study of sentences Selected from Financial Times
Published 2019“…With the rising demand for cross-cultural communication arising from globalisation, emerging technologies in the IT industry have made machine translation tools the most accessible in meeting one’s daily translation needs. In light of this, this paper aims to conduct a comparison of two mainstream online MT tools, namely Google Translate and Youdao Translation, through determining which tool provides higher English-Chinese translation quality in terms of translating informative content. …”
Get full text
Thesis -
8605
Qucs: a GPL software package for circuit simulation, compact device modeling and circuit macromodeling from DC to RF and beyond
Published 2008Get full text
Get full text
Conference or Workshop Item -
8606
Expressions of Ionianness in the Roman period
Published 2020“…They also continued to hold common meetings and festivals as members of the Ionian Koinon, which can still be seen as the main focal point of Ionianness in the Roman period. …”
Thesis -
8607
Local climate action from the middle-out: the social potential of craft guilds to facilitate low-carbon installations in Germany
Published 2024“…By recognising the contextual social sphere of installation as potential, policymakers can design more effective implementation strategies that gain people’s support by ‘meeting them where they are’.…”
Journal article -
8608
Characteristics of board and shariah board on risk-taking and performance: evidence from Takaful operators in Malaysia
Published 2024“…More women on BOD might reduce returns on assets, while frequent BOD meetings and a highly qualified SB might lower return on equity. …”
Get full text
Article -
8609
The Use of Films to Address Communication Apprehension in the English Language Classroom at Universiti Utara Malaysia (S/O 13669)
Published 2021“…The results of the study shows that students indicated lower communication apprehension levels overall and within the subcategories of group discussion, meetings, interpersonal communication and public speaking. …”
Get full text
Monograph -
8610
Improving Student Outcomes Through Universal Design for Learning: A Case Study of Color Vision Deficiency in Learning Visual Design (S/O: 14513)
Published 2022“…Meanwhile, Universal Design for Learning (UDL) provides the framework that meets the needs of every student in a classroom through its three main principles: Engagement, Representation, and Action and Expression. …”
Get full text
Monograph -
8611
Minimum Wage Policy Effects on Economic Efficiency and Poverty (S/O 12183)
Published 2020“…First, the mere presence of minimum wage policy does not have any bearing on efficiency, poverty and income inequality. …”
Get full text
Monograph -
8612
A novel CCHP system based on a closed PEMEC-PEMFC loop with water self-supply
Published 2023“…When the system gives priority to meeting the electric and cooling load, there will be insufficient heat at the initial stage of operation. …”
Get full text
Journal Article -
8613
STandards for reporting interventions in clinical trials of tuina/massage (STRICTOTM): extending the CONSORT statement
Published 2024“…Methods: A group of professional clinicians, trialists, methodologists, developers of reporting guidelines, epidemiologists, statisticians, and editors has developed this STRICTOTM checklist through a standard methodology process recommended by the EQUATOR (Enhancing the QUAlity and Transparency of Health Research) Network, including prospective registration, literature review, draft of the initial items, three rounds of the Delphi survey, consensus meeting, pilot test, and finalization of the guideline. …”
Get full text
Journal Article -
8614
Understanding technology acceptance and use in social media platforms: a systematic literature review and the development of research framework
Published 2024“…The review's methodology involves the use of empirical evidence that meets predetermined inclusion criteria and addresses specific research questions. …”
Get full text
Article -
8615
Roseburia intestinalis generated butyrate boosts anti-PD-1 efficacy in colorectal cancer by activating cytotoxic CD8⁺ T cells
Published 2023“…R. intestinalis or butyrate also significantly improved antiprogrammed cell death protein 1 (anti-PD-1) efficacy in mice bearing MSI-low CT26 tumours. Mechanistically, butyrate directly bound to toll-like receptor 5 (TLR5) receptor on CD8(+) T cells to induce its activity through activating nuclear factor kappa B (NF-& kappa;B) signalling. …”
Get full text
Journal Article -
8616
Crowdsourcing as Reflective Political Practice: Building a Location-based Tool for Civic Learning and Engagement
Published 2020“…They require that citizens leave the places they normally inhabit physically or virtually and commit to a separate space and set of processes. Town hall meetings are still a key point of engagement, occurring during specific times and in specific places. …”
Get full text
Article -
8617
Development of a carbon fiber/polyamide 12 composite via selective laser sintering
Published 2020“…Its technologies have evolved over the decades and 3D printing now meets the demand for production of end-use parts in almost all industrial sectors. …”
Get full text
Final Year Project (FYP) -
8618
Automatic memory usage tracking for low-end firmware codebase
Published 2025“…The results showcase a robust solution that not only meets current firmware profiling requirements but also lays the groundwork for future innovations in automated device profiling and sustainable software development. …”
Get full text
Thesis-Master by Coursework -
8619
Design and development of a four - wheel educational robot remote controlled by tablet
Published 2015“…By using Python as the main programming language and Raspberry Pi B+ as the micro controller, corresponding hardware and software design are implemented to get a functional robot that meets the demands of schools and parents. The robot has electrical hardware like speakers, camera, servomotors, Dynamixel AX- 12A motor and LED matrix. …”
Get full text
Final Year Project (FYP) -
8620
Blockchain and FL-based secure architecture for enhanced external Intrusion detection in smart farming
Published 2025“…Smart farming influences advanced technologies to optimize agricultural procedures, yet it meets significant cybersecurity challenges, particularly in External Intrusion Detection (EID). …”
Get full text
Article